securing yourself in the cyber world
DESCRIPTION
Edgis Sharing Session – Securing Yourself in the Cyber World at Dunearn Secondary School (Lower Secondary) August, 2013TRANSCRIPT
Emil Tan
Team Lead, Co-Founder
http://edgis-security.org
@EdgisSecurity
Securing Yourself in the Cyber World
Limit your Personal Information that you put Online
Review your Online Identity Regularly
Install Security Software
Keep your Device & Software Updated
Do not Install Unknown Software
Use Strong Password
Limit your Connectivity when not in use
Install Security Software
• Antivirus, Firewall, Backup,
Sites Advisory etc.
• Antivirus, Backup, Locate
Missing Device, Sites
Advisory, etc.
Keep your Device & Software Updated
Do not Install Unknown Software
Use Strong Password
Limit your Connectivity when not in use
Install Security Software
Keep your Device & Software Updated
• Operating System
• Software
• Operating System
• Apps
• Firmware
Do not Install Unknown Software
Use Strong Password
Limit your Connectivity when not in use
Install Security Software
Keep your Device & Software Updated
Do not Install Unknown Software
• Do not download & install
software from untrusted
sources
• Do not download & install
apps from untrusted sources
• Do not jailbreak your phone
Use Strong Password
Limit your Connectivity when not in use
Install Security Software
Keep your Device & Software Updated
Do not Install Unknown Software
Use Strong Password
• At least 8 characters long
• Containing both UPPER and lower case, numbers, & symbols
• NOT dictionary words, personal information, guessable patterns
• Change your password regularly
Limit your Connectivity when not in use
Install Security Software
Keep your Device & Software Updated
Do not Install Unknown Software
Use Strong Password
Limit your Connectivity when not in use
• Disable WiFi and Bluetooth when not in use
• Do not connect to untrusted networks
Malware Phishing
Malware (Malicious Software)
Viruses
Trojan Horse Scareware
Worm
Malware (Malicious Software)
Malware (Malicious Software)
Malware (Malicious Software)
Malware (Malicious Software)
Techniques
Platforms Techniques
• Removable Storage Media
• Social Media
• Websites
• Fear
• Curiosity
• Trust
Phishing
An act to acquire information (e.g. username /
password) by masquerading as a trustworthy entity in
an electronic communication.
Phishing
Phishing
Pn20.ru/wp-gdt.php?QZNF7LMRCFXQO
Phishing
Phishing
Phishing
Techniques
Platforms Techniques
• Removable Storage Media
• Social Media
• Websites
• Fear
• Curiosity
• Trust
Platforms Techniques
• Social Media
• Fear
• Curiosity
• Trust
Limit your Personal Information that you
put Online
Review your Online Identity Regularly
Install Security Software
Keep your Device & Software Up to Date
Do not Install Unknown Software
Use Strong Password
Limit your Connectivity when not in use
Platforms Techniques
• Wherever YOU are! • Fear
• Curiosity
• Trust